From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The London Underground is getting Wi-Fi. Of course there are security fears:
But Will Geddes, founder of ICP Group which specialises in reducing terror or technology...schneier From Schneier on Security | April 13, 2011 at 06:14 PM
This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...schneier From Schneier on Security | April 13, 2011 at 11:25 AM
You'd think the country would already have one of these:
Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...schneier From Schneier on Security | April 12, 2011 at 07:06 PM
Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...schneier From Schneier on Security | April 12, 2011 at 11:03 AM
I didn't know about this:
The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers.
This...schneier From Schneier on Security | April 11, 2011 at 06:20 PM
The former CIA general counsel, John A. Rizzo, talks about his agency's assassination program, which has increased dramatically under the Obama administration:
...schneier From Schneier on Security | April 11, 2011 at 11:33 AM
Wendy Williams, Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid.
Kraken is the traditional name for gigantic sea monsters, and this book...schneier From Schneier on Security | April 8, 2011 at 09:08 PM
Colors are so last decade:
The U.S. government's new system to replace the five color-coded terror alerts will have two levels of warnings schneier From Schneier on Security | April 8, 2011 at 06:23 PM
This is impressive, and scary:
Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...schneier From Schneier on Security | April 8, 2011 at 11:22 AM
Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...schneier From Schneier on Security | April 7, 2011 at 06:10 PM
It's been patented; no idea if it actually works.
...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...schneier From Schneier on Security | April 7, 2011 at 11:29 AM
"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart:
Abstract:The cumulative increase...schneier From Schneier on Security | April 6, 2011 at 11:03 AM
I have no idea why the Epsilon hack is getting so much press.
Yes, millions of names and e-mail addresses might have been stolen. Yes, other customer information...schneier From Schneier on Security | April 5, 2011 at 05:58 PM
Here's some very clever thinking from India's chief economic adviser. In order to reduce bribery, he proposes legalizing the giving of bribes:
Under the current...schneier From Schneier on Security | April 5, 2011 at 01:46 PM
Interesting post -- and discussion -- on Making Light about ebook fraud. Currently there are two types of fraud. The first is content farming, discussed in these...schneier From Schneier on Security | April 4, 2011 at 01:40 PM
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...schneier From Schneier on Security | April 1, 2011 at 11:58 AM
This isn't good:
The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...schneier From Schneier on Security | March 31, 2011 at 12:00 PM
In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph:
Despite...schneier From Schneier on Security | March 30, 2011 at 12:14 PM